Example: bankruptcy

Chapter 12. Database Security - University of Cape Town

Chapter 12. Database SecurityTable of contents Objectives Introduction The scope of Database Security Overview Threats to the Database Principles of Database Security Security models Access control Authentication and authorisation Authentication Authorisation Access philosophies and management Database Security issues Access to key fields Access to surrogate information Problems with data extraction Access control in SQL Discretionary Security in SQL Schema level Authentication Table level SQL system tables Mandatory Security in SQL Data protection Computer misuse Security plan Authentication and authorisation schematic Authentication and authorisation Access control activities Overview The problem Activity 1 Creating the Database schema Activity 2 Populating the Database Activity 3 Analysing the problem Activity 4 Executing the Security script (if you have a DBMS thatpermits this) Activity 5 Testing the access control (if you have a DBMS thatpermits this) Activity 6 Conclusion Activity 7 Postscript1 ObjectivesAt the end of this Chapter you should be able to: Understand and explain the place of Database Security in the context ofsecurity analysis and management.

• Appreciate the limitations of security subsystems. Introduction In parallel with this chapter, you should read Chapter 19 of Thomas Connolly and Carolyn Begg, “Database Systems A Practical Approach to Design, Imple-mentation, and Management”, (5th edn.). Security is a large subject and one that, because it touches every activity of

Tags:

  Database, Security, Chapter, Chapter 12, Database security

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Chapter 12. Database Security - University of Cape Town

1 Chapter 12. Database SecurityTable of contents Objectives Introduction The scope of Database Security Overview Threats to the Database Principles of Database Security Security models Access control Authentication and authorisation Authentication Authorisation Access philosophies and management Database Security issues Access to key fields Access to surrogate information Problems with data extraction Access control in SQL Discretionary Security in SQL Schema level Authentication Table level SQL system tables Mandatory Security in SQL Data protection Computer misuse Security plan Authentication and authorisation schematic Authentication and authorisation Access control activities Overview The problem Activity 1 Creating the Database schema Activity 2 Populating the Database Activity 3 Analysing the problem Activity 4 Executing the Security script (if you have a DBMS thatpermits this) Activity 5 Testing the access control (if you have a DBMS thatpermits this) Activity 6 Conclusion Activity 7 Postscript1 ObjectivesAt the end of this Chapter you should be able to: Understand and explain the place of Database Security in the context ofsecurity analysis and management.

2 Understand, explain and apply the Security concepts relevant to databasesystems. Understand, identify and find solutions to Security problems in databasesystems. Understand the basic language of Security mechanisms as applied todatabase systems. Analyse access control requirements and perform fairly simple implemen-tations using SQL. Appreciate the limitations of Security parallel with this Chapter , you should read Chapter 19 of Thomas Connollyand Carolyn Begg, Database Systems A Practical Approach to Design, Imple-mentation, and Management , (5th edn.). Security is a large subject and one that, because it touches every activity ofan information system, appears everywhere. In the main text you will startwith a thumbnail introduction to Security , while the extension reading containsreferences for you to pursue when you earlier chapters in this module you have met concepts and techniques whichcan be regarded as Security measures.

3 For example, the process of recovery,whether from partial or total failure, should be considered as having a securitydimension. Nearly all the work on concurrency (see Chapter 13) is directed atanother aspect of Security . Again, a thumbnail introduction is main work you do in this Chapter , however, is directed to Database securityrather than Security in general, and to the principles of Security theory andpractice as they relate to Database Security . These are technical aspects ofsecurity rather than the big Chapter is organised into two parts. The first part covers Security princi-ples and models itself in two parts moving from the softer principles (settingthe universe of discourse) through to some specific technical issues of databasesecurity. The second part is about logical access control in SQL major practical area you will cover is the area of access control. After adiscussion of the principles, you will quickly be getting into some detail of access2control in SQL databases.

4 Extension reading, both textbooks and websites, isgiven for you to pursue the detail is not covered in this Chapter , but is covered elsewhere in the module, arethe subjects of Database administration, transaction recovery and catastropherecovery. The first of these is directly related to management controls on opera-tion and development. The second is directly related to Database integrity andconsistency, thus being largely an internal matter. The third is easier to followas an extension of the first and second. But all three are Security scope of Database securityOverviewAll systems have ASSETS and Security is about protecting assets. The firstthing, then, is to know your assets and their value. In this Chapter , concentrateon Database objects (tables, views, rows), access to them, and the overall systemthat manages them. Note that not all data is sensitive, so not all requires greateffort at protection. All assets are under second thing to know is what THREATs are putting your assets at include things such as power failure and employee fraud.

5 Note thatthreats are partly hypothetical, always changing and always imperfectly activity is directed at protecting the system from perceived a threat is potential, you must allow for it to become an actuality. Whenit becomes actual there is an IMPACT. Impact you can consider and plan in the worst case, there will be a LOSS. Security activity here is directedat minimising the loss and recovering the Database to minimise the loss as wellas further protecting from the same or similar outlined development mechanism is:1. Document assets (what they are, what their value is).2. Identify treats (what they are, how likely they are, what the impact is ifthey occur).3. Associate threats with each Design mechanisms to protect each asset appropriate to its value and thecost of its protection, to detect a Security breach against each asset, tominimise the losses incurred and to recover normal to the databaseYou will build your Security skills from two directions.

6 One is from the appre-ciation and awareness of changing threats, and the other from the technicalremedies to them. Threats include: Unauthorised modification: Changing data values for reasons of sabotage,crime or ignorance which may be enabled by inadequate Security mecha-nisms, or sharing of passwords or password guessing, for example. Unauthorised disclosure: When information that should not have beendisclosed has been disclosed. A general issue of crucial importance, whichcan be accidental or Loss of availability: Sometimes called denial of service. When the databaseis not available it incurs a loss (otherwise life is better without the sys-tem!). So any threat that gives rise to time offline, even to check whethersomething has occurred, is to be rest of this section is an overview of the categories of specific regulatorythreats to Database systems. Commercial sensitivity:Most financial losses through fraud arise fromemployees.

7 Access controls provide both protection against criminal actsand evidence of attempts (successful or otherwise) to carry out acts detri-mental to the organisation, whether fraud, extraction of sensitive data orloss of availability. Personal privacy and data protection:Internationally, personal datais normally subject to legislative controls. Personal data is data aboutan identifiable individual. Often the individual has to be alive but themethod of identification is not prescribed. So a postal code for a homemay in some cases identify an individual, if only one person is living atan address with the postal code. Such data needs careful handling more information see Data Protection later in the Chapter . The issuesare too extensive to be discussed here but the implications should be data needs to be identified as such. Controls must exist on theuse of that data (which may restrict ad-hoc queries). Audit trails of allaccess and disclosure of the information need to be retained as evidence.

8 Computer misuse:There is also generally legislation on the misuse ofcomputers. Misuse includes the violation of access controls and attemptsto cause damage by changing the Database state or introducing wormsand viruses to interfere with proper operation. These offences are oftenextraditable. So an unauthorised access in Hong Kong using computersin France to access databases in Germany which refer to databases inAmerica could lead to extradition to France or Germany or the USA. Audit requirements:These are operational constraints built around theneed to know who did what, who tried to do what, and where and wheneverything happened. They involve the detection of events (includingCONNECT and GRANT transactions), providing evidence for detection,assurance as well as either defence or prosecution. There are issues relatedto computer-generated evidence not covered considerations of logical access to the Database , it is easy to lose sight ofthe fact that all system access imposes risks.

9 If there is access to operatingsystem utilities, it becomes possible to access the disk storage directly andcopy or damage the whole Database or its components. A full considerationhas to take all such access into account. Most analysts would be looking tominimise communications (direct, network and telecommunications) and isolate5the system from unnecessary threats. It is also likely that encryption would beused both on the data and the schema. Encryption is the process of convertingtext and data into a form that can only be read by the recipient of that data ortext, who has to know how to convert it back to a clear will find it easier to consider Security and auditing as issues separate fromthe main Database functions, however they are implemented. Visualise thesecurity server and audit servers as separate functional of Database securityTo structure thoughts on Security , you need a model of Security . These come invarious forms that depend on roles, degree of detail and purpose.

10 The majorcategories are areas of interest (threats, impact and loss) as well as the actionsinvolved in dealing with risks are to be seen in terms of the loss of assets. These assets include: Hardware Software Data Data quality Credibility Availability Business benefitHere we are primarily concerned with threats to the data and data quality but,of course, a threat to one asset has consequential impact on other assets. What isalways important is that you are very clear on just what asset needs as a summary:You need to accept that Security can never be perfect. There always remains anelement of risk, so arrangements must be made to deal with the worst eventuality- which means steps to minimise impact and recover effectively from loss ordamage to assets. Points to bear in mind:61. Appropriate Security - you do not want to spend more on Security thanthe asset is You do not want Security measures to interfere unnecessarily with theproper functioning of the modelsA Security model establishes the external criteria for the examination of securityissues in general, and provides the context for Database considerations, includ-ing implementation and operation.


Related search queries